C1 online systems Flashcards
cloud storage
a service model that allows users to store and access data on remote servers over the internet
The impact and implications on INDIVIDUALS of using cloud storage on
+ file versions are up to date
+synchronisation across all devices
+compatibility, access on a variety of devices
+flexibility and convenient
+meny free cloud storage providers
- relies on stable internet connection
-uses heavy bandwidth
-security issues
-potential hacker threats
The impact and implications on ORGANISATIONS of using cloud storage
+storage is scalable
+cloud backups are physically more secure
+multiple locations of data improve redundancies
+reduces physical storage device costs
+availability of access location
+collaboration
-security relies on the supplier as they have access to the data
+requires fast bandwidth and low latency, can be costly
Cloud Computing
Cloud computing is the on-demand use of hosted computing resources such as software applications/programs, servers, databases and networking, controlled by a 3rd party provider over the internet.
The impact and implications on individuals of using cloud computing
The impact and implications on organisations of using cloud computing
Cloud Computing SAAS
Software as a Service, A cloud computing model that allows users to access software applications over the internet. the provider manages the software and hardware, and provides the software to customers on a pay-as-you-go basis
Cloud Computing IAAS
Infrastructure as a Service, a cloud computing model that provides on-demand access to computing resources like storage, servers, networking, and virtualization
Cloud Computing PAAS
Platform as a Service, is a cloud computing model that provides a complete platform for developing, running, and managing applications. Provides a cloud-based environment with everything developers need to build apps, including infrastructure, development tools, operating systems, networking, storage
VPNs
-A user uses VPN client software to login to the VPN system
-The VPN server will authenticate the user
-The VPN server creates a secure tunnel across the internet using tunneling protocols
-Data being sent and received through the VPN is also encrypted for security reasons
If a hacker is detected by the VPN, the Tunnel used will collapse and be recreated using another route
Remote Desktop
-A user can access and control their work device remotely.
-They will be able to remotely access their work LAN and resources such as printers.
- Can be used to demonstrate software to users remotely.
- Can be used to demonstrate software to users remotely
-compatible with a vpn
implications of a Remote desktop
- make a mistake which could result in loss of data
-add malware or tracking software that could corrupt/steal/delete data
-Access confidential/personal material
-access apps such as the camera on the device which would allow them to see/hear the user